Filters
Question type

To prevent problem behaviors by increasing the perceived risk of discovery and punishment for those who would attack or otherwise abuse the system

Correct Answer

Answered by ExamLex AI

Answered by ExamLex AI

To prevent problem behaviors by increasi...

View Answer

Once the OS is known, all of the vulnerabilities to which a system is susceptible can easily be determined.

A) True
B) False

Correct Answer

verifed

verified

Using __________, the system reviews the log files generated by servers, network devices, and even other IDPSs.


A) LFM
B) stat IDPS
C) AppIDPS
D) HIDPS

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

An IDPS can be configured to dial a phone number and produce an alphanumeric page or other type of signal or message.

A) True
B) False

Correct Answer

verifed

verified

An HIDPS functions on the host system, where encrypted traffic will have been decrypted and is available for processing.

Correct Answer

Answered by ExamLex AI

Answered by ExamLex AI

An HIDPS, or Host Intrusion Detection an...

View Answer

A false positive is the failure of an IDPS system to react to an actual attack event.

A) True
B) False

Correct Answer

verifed

verified

__________ are decoy systems designed to lure potential attackers away from critical systems.


A) Honeypots
B) Bastion hosts
C) Wasp nests
D) Designated targets

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Fingerprinting is the organized research of the Internet addresses owned or controlled by a target organization. _________________________

A) True
B) False

Correct Answer

verifed

verified

The integrity value, which is based upon fuzzy logic, helps an administrator determine how likely it is that an IDPS alert or alarm indicates an actual attack in progress. _________________________

A) True
B) False

Correct Answer

verifed

verified

To assist in footprint intelligence collection, attackers may use an enhanced Web scanner that, among other things, can scan entire Web sites for valuable pieces of information, such as server names and e-mail addresses.

A) True
B) False

Correct Answer

verifed

verified

A(n) __________ IDPS is focused on protecting network information assets.


A) network-based
B) host-based
C) application-based
D) server-based

E) None of the above
F) All of the above

Correct Answer

verifed

verified

A passive vulnerability scanner is one that initiates traffic on the network in order to determine security holes.

A) True
B) False

Correct Answer

verifed

verified

The ____________________ port is also known as a switched port analysis (SPAN) port or mirror port.

Correct Answer

verifed

verified

A fully distributed IDPS control strategy is an IDPS implementation approach in which all control functions are applied at the physical location of each IDPS component.

A) True
B) False

Correct Answer

verifed

verified

A padded cell is a hardened honeynet. _________________________

A) True
B) False

Correct Answer

verifed

verified

When a collection of honeypots connects several honeypot systems on a subnet, it may be called a(n) honeynet. _________________________

A) True
B) False

Correct Answer

verifed

verified

HIDPSs are also known as system ____________________ verifiers.

Correct Answer

verifed

verified

The use of switched network protocols does not affect an HIDPS.

Correct Answer

Answered by ExamLex AI

Answered by ExamLex AI

The statement "The use of switched netwo...

View Answer

NIDPSs are not usually susceptible to direct attack and may not be detectable by attackers.

Correct Answer

Answered by ExamLex AI

Answered by ExamLex AI

Network Intrusion Detection and Preventi...

View Answer

A ____________________ vulnerability scanner listens in on the network and identifies vulnerable versions of both server and client software.

Correct Answer

verifed

verified

Showing 101 - 120 of 121

Related Exams

Show Answer